摘要 |
<p>Techniques for alarm condition processing in communication networks. In one example, a method comprises the following steps. An alarm condition associated with a network element of a communication network is detected. Alarm indication data is generated based on the alarm condition detected. The alarm indication data is protected using a cryptographic key to generate protected alarm indication data. The protected alarm indication data (e.g., tamper evidence) is stored in a non- volatile memory, and may be reset either autonomously (e.g., timer expiration) or from the communication network.</p> |